/

CVE-2023-35078 Report - Details, Severity, & Advisorie...

CVE-2023-35078 Report - Details, Severity, & Advisories

Twingate Team

May 3, 2024

CVE-2023-35078 is a critical vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM) systems, allowing unauthorized users to bypass authentication and access restricted resources. This vulnerability has a severity score of 9.8 and impacts systems running Ivanti EPMM up to and including version 11.10. Users and organizations are urged to review security advisories and apply necessary patches to protect their systems from potential exploitation.

How do I know if I'm affected?

If you're using Ivanti Endpoint Manager Mobile (EPMM) and want to know if you're affected by the vulnerability, check your software version. The vulnerability impacts all supported versions of EPMM, specifically Version 11.4 releases 11.10, 11.9, and 11.8. Older versions are also at risk. This vulnerability allows unauthorized users to access restricted resources without proper authentication, potentially exposing personal information and enabling unauthorized configuration changes.

What should I do if I'm affected?

If you're affected by the vulnerability, take immediate action to secure your system. Apply the available patch provided by Ivanti. If you're using an older version of the software, use the RPM script provided by Ivanti for remediation. For further assistance, log a case in the Success Portal.

Is CVE-2023-35078 in CISA’s Known Exploited Vulnerabilities Catalog?

Yes, it is in CISA's Known Exploited Vulnerabilities Catalog. The vulnerability, named Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability was added on July 25, 2023, with a due date of August 15, 2023. The required action is to apply mitigations as per vendor instructions or discontinue the product's use if mitigations are unavailable. This security issue in Ivanti's software could allow unauthorized access to personal information and server changes, so it's crucial to follow the provided instructions to fix the problem.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-287, which is also known as Improper Authentication, affects Ivanti Endpoint Manager Mobile (EPMM) and allows unauthorized users to access restricted resources without proper authentication. A patch is available to fix this issue.

For more details

CVE-2023-35078 is a critical vulnerability affecting Ivanti Endpoint Manager Mobile systems, with potential consequences including unauthorized access to personal information and server changes. For a comprehensive understanding of this vulnerability, consult the NVD page and the resources listed below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2023-35078 Report - Details, Severity, & Advisorie...

CVE-2023-35078 Report - Details, Severity, & Advisories

Twingate Team

May 3, 2024

CVE-2023-35078 is a critical vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM) systems, allowing unauthorized users to bypass authentication and access restricted resources. This vulnerability has a severity score of 9.8 and impacts systems running Ivanti EPMM up to and including version 11.10. Users and organizations are urged to review security advisories and apply necessary patches to protect their systems from potential exploitation.

How do I know if I'm affected?

If you're using Ivanti Endpoint Manager Mobile (EPMM) and want to know if you're affected by the vulnerability, check your software version. The vulnerability impacts all supported versions of EPMM, specifically Version 11.4 releases 11.10, 11.9, and 11.8. Older versions are also at risk. This vulnerability allows unauthorized users to access restricted resources without proper authentication, potentially exposing personal information and enabling unauthorized configuration changes.

What should I do if I'm affected?

If you're affected by the vulnerability, take immediate action to secure your system. Apply the available patch provided by Ivanti. If you're using an older version of the software, use the RPM script provided by Ivanti for remediation. For further assistance, log a case in the Success Portal.

Is CVE-2023-35078 in CISA’s Known Exploited Vulnerabilities Catalog?

Yes, it is in CISA's Known Exploited Vulnerabilities Catalog. The vulnerability, named Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability was added on July 25, 2023, with a due date of August 15, 2023. The required action is to apply mitigations as per vendor instructions or discontinue the product's use if mitigations are unavailable. This security issue in Ivanti's software could allow unauthorized access to personal information and server changes, so it's crucial to follow the provided instructions to fix the problem.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-287, which is also known as Improper Authentication, affects Ivanti Endpoint Manager Mobile (EPMM) and allows unauthorized users to access restricted resources without proper authentication. A patch is available to fix this issue.

For more details

CVE-2023-35078 is a critical vulnerability affecting Ivanti Endpoint Manager Mobile systems, with potential consequences including unauthorized access to personal information and server changes. For a comprehensive understanding of this vulnerability, consult the NVD page and the resources listed below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2023-35078 Report - Details, Severity, & Advisories

Twingate Team

May 3, 2024

CVE-2023-35078 is a critical vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM) systems, allowing unauthorized users to bypass authentication and access restricted resources. This vulnerability has a severity score of 9.8 and impacts systems running Ivanti EPMM up to and including version 11.10. Users and organizations are urged to review security advisories and apply necessary patches to protect their systems from potential exploitation.

How do I know if I'm affected?

If you're using Ivanti Endpoint Manager Mobile (EPMM) and want to know if you're affected by the vulnerability, check your software version. The vulnerability impacts all supported versions of EPMM, specifically Version 11.4 releases 11.10, 11.9, and 11.8. Older versions are also at risk. This vulnerability allows unauthorized users to access restricted resources without proper authentication, potentially exposing personal information and enabling unauthorized configuration changes.

What should I do if I'm affected?

If you're affected by the vulnerability, take immediate action to secure your system. Apply the available patch provided by Ivanti. If you're using an older version of the software, use the RPM script provided by Ivanti for remediation. For further assistance, log a case in the Success Portal.

Is CVE-2023-35078 in CISA’s Known Exploited Vulnerabilities Catalog?

Yes, it is in CISA's Known Exploited Vulnerabilities Catalog. The vulnerability, named Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability was added on July 25, 2023, with a due date of August 15, 2023. The required action is to apply mitigations as per vendor instructions or discontinue the product's use if mitigations are unavailable. This security issue in Ivanti's software could allow unauthorized access to personal information and server changes, so it's crucial to follow the provided instructions to fix the problem.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-287, which is also known as Improper Authentication, affects Ivanti Endpoint Manager Mobile (EPMM) and allows unauthorized users to access restricted resources without proper authentication. A patch is available to fix this issue.

For more details

CVE-2023-35078 is a critical vulnerability affecting Ivanti Endpoint Manager Mobile systems, with potential consequences including unauthorized access to personal information and server changes. For a comprehensive understanding of this vulnerability, consult the NVD page and the resources listed below.